SlideShare a Scribd company logo
1 of 68
Download to read offline
1
SIBUGAY TECHNICAL INSTITUTE
Lower Taway, Ipil, Zamboanga Sibugay
Tel-Fax #: (062) 333-2469
www.sibugaytech.com
College of Computer Studies
MODULE ON
COMPUTER NETWORKING 2
Prepared by:
Kean Rafael N. Mariano
Kean Rafael N. Mariano / 09351190287
2
Introduction to computer
Networking
Learning Objective:
At the end of this module, you should be able to:
The definitions of networking
Network peripherals, hardware and software
Network Definition
A network can be defined as two or more computers connected together in such a
way that they can share resources.
The purpose of a network is to share resources.
A resource may be:
or just about anything else that exists on a computer.
WHAT IS NETWORKING?
A network is simply a collection of computers or other hardware devices that are
connected together, either physically or logically, using special hardware and
software, to allow them to exchange information and cooperate. Networking is the
term that describes the processes involved in designing, implementing, upgrading,
managing and otherwise working with networks and network technologies.
LESSON
1
Week 1-2
3
Advantages of networking
The Disadvantages (Costs) of Networking
Fundamental Network Classifications
Local Area Networks (LANs):
A local area network (LAN) is a computer network covering a small
geographic area, like a home, office, or group of buildings
Wide Area Networks (WANs):
a
(i.e., any network whose communications links cross metropolitan, regional,
or national boundaries). Or, less formally, a network that uses routers and
public communications links
The largest and most well-known example of a WAN is the Internet.
s are used to connect LANs and other types of networks together, so
that users and computers in one location can communicate with users and
computers in other locations
Metropolitan Area Network (MAN):
o A metropolitan area network (MAN) is a network that interconnects users
with computer resources in a geographic area or region larger than that
covered by even a large local area network (LAN) but smaller than the area
4
covered by a wide area network (WAN). The term is applied to the
interconnection of networks in a city into a single larger network (which may
then also offer efficient connection to a wide area network). It is also used to
mean the interconnection of several local area networks by bridging them with
backbone lines. The latter usage is also sometimes referred to as a campus
network.
5
An intranet is a private network that is contained within an enterprise. It may
consist of many interlinked local area networks and also use leased lines in the
wide area network.
An intranet uses TCP/IP, HTTP, and other Internet protocols and in general looks
like a private version of the Internet. With tunneling, companies can send
private messages through the public network, using the public network with
special encryption/decryption and other security safeguards to connect one
part of their intranet to another.
- a network of networks in
which users at any one computer can, if they have permission, get information
from any other computer (and sometimes talk directly to users at other
computers).
resources necessary to perform any task.
task.
resource on a client computer.
request and receive information over the
network client. Client computers also depends primarily on the central server
for processing activities
6
-to-peer network is a network where the computers act as both workstations
and servers.
at for small, simple, and inexpensive networks.
-to-peer networking setup, every computer is an equal, a peer in the
network.
particular device, and each of the devices usually
runs similar software. Any device can and will send requests to any other.
the task of providing services to a larger number of user machines called clients
7
or logical.
tar (physical only)
Bus
every workstation
of distance.
8
messages pass through the trunk, and each workstation checks to see if the message is
addressed to itself. If the address of the message matches the workstation’s address,
the network adapter copies the message to the card’s on- board memory.
it is difficult to add a workstation
have to completely reroute the cable and possibly run two additional lengths of it.
expensive to maintain.
Star Topology
hub, making it very easy to add a new workstation.
you might expect, if the central device goes down, the entire network goes down.)
9
an example of the organization of the star network.
ion to the hub.
The hub is placed in a central location in the office.
several more cables that need to be installed, plus the cost of the hubs that are needed.
Ring
unidirectional path where messages move workstation to workstation.
to its neighbor on a different network cable.
entity is removed from the ring.
anymore, mainly because the
hardware involved was fairly expensive and the fault tolerance was very low.
10
Mesh
the most complex in terms of physical design.
cabling.
–1)) ÷ 2 cables in the network. For
example, if you have five computers in a mesh network, it will use 5 × (5 – 1) ÷ 2,
which equals 10 cables. This complexity is compounded when you add another
workstation.
-computer, 10-cable network will jump to 15 cables just by
adding one more computer. Imagine how the person doing the cabling would feel if
you told them you had to cable 50 computers in a mesh network—they’d have to
come up with 50 × (50 – 1) ÷ 2 = 1225 cables!
very expensive to install and
maintain.
from it is its high fault tolerance.
11
data from source to destination.
route. It is for this reason that the mesh topology is still found in WANs to connect
multiple sites across WAN links. It uses devices called routers to search multiple
routes through the mesh and determine the best path.
Topology Advantages Disadvantages
Bus Cheap. Easy to install. Difficult to reconfigure.
Break in bus disables entire
network.
Star Cheap. Easy to install. More expensive than bus.
Easy to reconfigure.
Fault tolerant.
Ring Efficient. Easy to install. Reconfiguration difficult.
Very expensive.
Mesh Simplest. Most fault tolerant. Reconfiguration extremely
difficult. Extremely expensive.
Very complex.
12
Network Interface Card (NIC)
translate data into bytes for the CPU to understand.
1. - Preparing data
2. - Sending and controlling data
3. - Configuration
4. - Drivers
5. - Compatibility
6. - Performance
-lane interstate
highway. But on a network cable, data travels in a single stream, as on a one lane
highway. This difference can cause problems transmitting and receiving data, because
the paths traveled are not the same.
easily along the cable.
fiber-optic NICs, to optical signals).
13
These include the following:
- The maximum size of the data frames
- The amount of data sent before giving confirmation
- The time needed between transmissions
- The amount of time needed to wait before sending confirmation
- The amount of data a card can hold
- The speed at which data transmits
network cards are of the same type and they are connected to the same piece of cable.
IRQ address, Base I/O port address, and base memory address. Some may also use
DMA channels to offer better performance.
hardware addresses, neither one of them will be able to communicate.
proper device drivers.
operate in the Media Access Control sublayer of the Data Link layer of the OSI
model.
than one type of bus in your PC (for example, a combination ISA/PCI), use an NIC
that fits into the fastest type (the PCI, in this case).
specially important in servers, as the NIC can very quickly become a
bottleneck if this guideline isn’t followed.
performance and minimize the amount of time needed to transfer data packets across
the network.
shared memory adapter, and deciding to allow bus mastering.
its maximum allowed length by amplifying the network voltages so they travel
farther.
14
segments.
For example, we can extend an Ethernet 10Base2 network to 400 meters with a
repeater. But can’t connect an Ethernet and Token Ring network together with one.
not only include the network signals, but any noise on the wire as well.
with the amplified noise. For this reason, repeaters are used only as a temporary fix.
process that is also called broadcasting).
simply connect all ports together electrically and are usually not
powered.
to the other ports.
ligent” hubs, which
are hubs that can be remotely managed on the network.
15
mediocre, because of the design of Ethernet and the number of workstations that are
fighting to transmit. If you divide the segment into two segments of 100 workstations
each, the traffic will be much lower on either side and performance will increase.
he destination address, it is able to forward packets; otherwise a
bridge will forward the packets to all segments. They are more intelligent than
repeaters but are unable to move data across multiple networks simultaneously.
types or perform intelligent path selection. For that function, you would need a router.
16
determine the best path for sending data.
path that data can take to get to its destination.
such, they analyze every packet, causing packet-forwarding delays. Because of this
intelligence, they are also more expensive.
etwork
segments.
-end network switches appear nearly identical to network hubs, but a switch
contains more "intelligence" (and a slightly higher price tag) than a network hub.
determining the source and destination device of that packet, and forwarding it
appropriately.
17
network switch conserves network bandwidth and offers generally better performance
than a hub.
hub share the bandwidth among themselves, while a device connected to a switch port
has the full bandwidth all to itself.
-Mbps network,
then each node may only get a portion of the 10 Mbps if other nodes on the hub want
to communicate as well. .
ch, each node could possibly communicate at the full 10 Mbps.
Activity 1
Answer the following questions.
1. Draw 2 buildings and connect 5 computers each using 2 different topologies.
2. Define the following terms:
a. Switch
b. Router
c. File
d. Host
18
Your Answer here:
19
TYPES OF COMPUTER
NETWORK
Learning Objectives:
At the end of this module, you should be able to:
1. Know the difference between Client-server to Peer –to Peer network
2. Know the advantages and disadvantages of peer-to-peer network
3. Know the advantages and disadvantages of client-Server network
Classification of Network
▪ The architecture of a network is a logical design that determines how the devices
in the network communicate.
▪ The commonly used architectures for computer networks are:
1. Client-server architecture
2. Peer-to-peer architecture
3. Hybrid architecture
PEER-TO-PEER ARCHITECTURE
▪ On a network built using the peer-to-peer architecture, there is no specific
distinction exists between a client and a server.
▪ Any node can provide a service as well as send a request for a service from another
node on the network.
▪ The peer-to-peer network architecture allows sharing of resources, data, and users.
▪ Each node on the network has full control over the network resources.
LESSON
2Week 2-3
20
▪ Peer-to-peer network is also called workgroup
▪ No hierarchy among computers all are equal
▪ No administrator responsible for the network
▪ Advantages of peer-to-peer networks:
▪ Low cost
▪ Simple to configure
▪ User has full accessibility of the computer
21
▪ Disadvantages of peer-to-peer networks:
▪ May have duplication in resources
▪ Difficult to uphold security policy
▪ Difficult to handle uneven loading
▪ Where peer-to-peer network is appropriate:
▪ 10 or less users
▪ No specialized services required
▪ Security is not an issue
▪ Only limited growth in the foreseeable future
▪ On a network built using the client- server architecture, the devices communicate to
other devices through a central computer referred to as a server.
▪ The server is a computer with high processing power, which provides services for
the other computers on the network.
▪ The client is a terminal that accesses the resources available on a server.
22
▪ Clients (Workstation)
▪ Computers that request network resources or services
▪ Network Servers
▪ Computers that manage and provide network resources and services to clients
▪ Usually have more processing power, memory and hard disk space than
clients
▪ Run Network Operating System that can manage not only data, but also
users, groups, security, and applications on the network
▪ Servers often have a more stringent requirement on its performance and
reliability
Advantages of client/server networks
▪ Facilitate resource sharing – centrally administrate and control
▪ Facilitate system backup and improve fault tolerance
▪ Enhance security – only administrator can have access to Server
▪ Support more users – difficult to achieve with peer-to-peer networks
Disadvantages of client/server networks
▪ High cost for Servers
▪ Need expert to configure the network
▪ Introduce a single point of failure to the system
23
Activity 2
Answer the following questions.
1. What is the difference between Client-server to Peer –to Peer network?
2. What are the advantages and disadvantages of peer-to-peer network?
Your Answer here:
24
TYPES OF DATA CABLE
Learning Objectives:
At the end of this module, you should be able to:
1. Differentiate the types of data cable
2. Know the best cable for the job
LESSON
3Week 4-5
25
26
27
28
29
Activity 3
Answer the following questions.
1. Differentiate CAT 6 from CAT6a cable
2. What is the best networking cable with low cost but great in performance?
Your Answer here:
30
IP ADDRESS & DOMAIN NAME
Learning Objectives:
At the end of this module, you should be able to:
1. Define IP
2. Know the purpose of IP Address
3. Know the difference between IPv4 vs. IPv6
4. Know the classes of IP Address
Internet Protocol Address
 IP address stands for internet protocol address; it is an identifying number
that is associated with a specific computer or computer network. When
connected to the internet, the IP address allows the computers to send and
receive information.
 IP address is a numerical label assigned to each device (e.g., computer,
printer) participating in a computer network that uses the Internet Protocol for
communication.
address is same as mobile no. which is unique.
network.
number.
system.
LESSON
4Week 7
31
each time, this is known as using a dynamic IP
address , or permanently by fixed configuration
of its hardware or software is known as using a
static IP address.
addresses. To help meet the demand for IP addresses, there are two types of addresses
used today, IPv4 and IPv6. Although you may only deal with an IPv4 address in your
local home, school, or small office you should also be aware of IPv6 addresses for
when you encounter them.
With an IPv4 IP address, there are five
classes of available IP ranges: Class A ,
Class B, Class C, Class D and Class E ,
while only A, B, and C are commonly
used. Each class allows for a range of
valid IP addresses, shown in the following
table.
32
Class A IP Address:
for networks that had a large number
of hosts on the network. The class
permitted up to 126 networks by
using the first octet of the address
for the network identification.
17 million hosts per network. In a
Class A address, the network number
values start at the number 1 and end at 127.
Class B IP Address:
medium to large networks. They allow
16,384 networks by using the first two
octets in the address for the network
identification.
hosts per network. Class B network
number values start at 128 and finish at 191.
Class C IP Address:
Class C IP addresses were used in small
LAN configurations. They allow for
approximately 2 million networks by using
the first three octets of the address for the
network identification.
This allows for 254 hosts per network.
A Class C network number value starts at
192 and ends at 223.
33
addresses begin with an octet in the 224-
to 239.255.255.255.
octet of these addresses
ranges between240and 255.
to a host device.
Domain Name System, or DNS, is the friendly naming system for giving addresses to web
servers and web pages. The domain name system gives every server a memorable and easy-
to-spell address. Simultaneously, the domain names hide the really technical IP address
which most viewers aren't interested in.
The top-level domains (TLDs) such as com, net and org are the highest level of domain
names of the Internet. Every domain name ends with a top-level domain label.
34
Below the top-level domains in the domain name hierarchy are the second-level domain
(SLD) names. These are the names directly to the left of .com, .net , and the other top-level
domains. As an example, in the domain flipkart .com is the second-level domain.
third-level domains, which are written immediately to the left of a second-level
domain. There can be fourth- and fifth-level domains, and so on, with virtually no limitation.
An example of an operational domain name with four levels of domain labels is
www.flipkart.com
WWW.FLIPKART.COM
THIRD .SECOND. TOP
Domain that falls under this category are named using 2 character country name
which are specified by ISO(international standard org.)
Example:
.in
.pk
.us
.uk
Domain that falls under this category are named using 3 character that indicates the
functionality of the organization.
Example:
.com
.edu
.org
.gov
35
36
Activity 4
Answer the following questions.
1. What is IP?
2. What is the main purpose of IP Address?
3. What are the classes of IP and explain each one?
Your Answer here:
37
STATIC AND DYNAMIC IP ADDRESS
Learning Objectives:
At the end of this module, you should be able to:
1. Know the difference between Static IP address to Dynamic IP Address
2. Know when to use Static and Dynamic IP Address.
LESSON
5
Week 8
38
ASSIGNING A STATIC IP ADDRESS
Here are the procedures in assigning an IP Address on a windows base
computer system:
• Open the Control Panel’s Network Connections icon.
• Open the icon representing your computer’s network connection.
• Click the Properties button in the Status dialog box.
• From the list of items, choose Internet Protocol (TCP/IP).
39
•CLICK THE PROPERTIES BUTTON. THE INTERNET PROTOCOL (TCP/IP)
PROPERTIES DIALOG BOX APPEARS.
• Type the IP address for your computer. Enter the appropriate IP Address in the IP
address section.
• Type a subnet mask. The value used on a local network is commonly 255.255.255.0,
but it can be different, such as 255.255.255.127.
40
• Type the default gateway address. The default gateway is the router, so type the
router’s address. Figure 54 shows an example of assigning an IP Address, Subnet
mask and default gateway.
• Type the address for the preferred DNS server. The address should be obtained from
your Internet Service Protocol. It is used to help your computer find web pages and
other addresses on the internet.
• Type the address for the alternate DNS server. The alternate Domain Name System
(DNS) server’s IP address is something that your ISP provides.
• Click OK to confirm the settings.
• Close all other open dialog boxes and windows.
41
42
Activity 5
Answer the following questions.
1. What is the difference between Static IP address to Dynamic IP Address?
2. When to use Static and Dynamic IP Address?
Your Answer here:
43
TOOLS & EQUIPMENT IN COMPUTER
NETWORKING AND ETHERNET
CABLING STANDARDS
Learning Objectives:
At the end of this module, you should be able to:
3. Enumerate and discuss the tools and equipments use in computer networking
4. Discuss the color scheme of T568A and T568B standardization of network
cabling system
LESSON
6Week 9-10
44
45
46
47
48
49
50
51
Activity 6
Answer the following questions.
4. When to use straight-trough cabling?
5. When to use cross over cabling?
Your Answer here:
52
STRUCTURED
CABLING SYSTEM
Learning Objectives:
At the end of this module, you should be able to:
5. Describe the role of different LAN cable in computer network according to its
type.
6. Explain and enumerate the different types of LAN cable and its use.
Terminologies
• TC – Thin Copper
• AL – Aluminum
• ANSI – American National Standard Institute
• TIA – Telecommunication Industry Association
• EIA – Electronic Industry Association
• ISO – International Organization for Standardization
• Network Topology – Infrastructure of computer network
• Ethernet Cable – Cable use to connect your computer to the network.
• ACR – Attenuation to Cross-Talk Ration
• BER – Bit Error Rate
• FEXT – Far End Cross-Talk
• NEXT – Near End Cross-Talk
• STP – Shielded Twisted Pair
• UTP – Unshielded Twisted Pair
LESSON
7
53
WHAT IS NETWORK CABLING
Cable is the medium through which information usually moves from one network
device to another. There are several types of cable which are commonly used with
LANs. In some cases, a network will utilize only one type of cable, other networks
will use a variety of cable types. The type of cable chosen for a network is related to
the network's topology, protocol, and size. Understanding the characteristics of
different types of cable and how they relate to other aspects of a network is necessary
for the development of a successful network.
54
(1) COAXIAL CABLE
The most common type of connector used with coaxial cables is the Bayone-Neill-
Concelman (BNC) connector.
To help avoid problems with your network, always use the BNC connectors that crimp, rather
screw, onto the cable.
(2) TWISTED PAIR
Twisted pair cabling comes in two varieties: shielded and unshielded. Unshielded twisted pair
(UTP) is the most popular and is generally the best option for school networks
The quality of UTP may vary from telephone-grade wire to extremely high-speed cable. The
cable has four pairs of wires inside the jacket. Each pair is twisted with a different number of
twists per inch to help eliminate interference from adjacent pairs and other electrical devices.
The tighter the twisting, the higher the supported transmission rate and the greater the cost
per foot.
(3) FIBER OPTIC CABLE
Fiber optic cabling consists of a center glass core surrounded by several layers
ofprotectivematerials. It transmits light rather than electronic signals eliminating the problem
of electrical interference. This makes it ideal for certain environments that contain a large
55
amount of electrical interference. It has also made it the standard for connecting networks
between buildings, due to its immunity tothe effects of moisture and lighting.
The number of mobile internet users and the proliferation of connected devices have led to
the exponential growth in global internet traffic. These traffic will make more network
providers to upgrade their networks and introduce more optical assemblies like fiber optic
cables, fiber optic connector, fiber optic transceiver,etc.
56
Activity 6
Answer the following questions.
6. Explain and enumerate the different types of LAN cable and its use
7. Describe the role of different LAN cable in computer network according to its type
Your Answer here:
57
NETWORK CABLING
Learning Objectives:
At the end of this module, you should be able to:
1. Learn proper way on crimping / creating network cables
UTP Cabling Steps
1. Strip cable end
2. Untwist wire ends
3. Arrange wires
4. Trim wires to size
5. Attach connector
6. Check
7. Crimp
8. Test
LESSON
8Week 13-14
58
59
60
61
62
WIRELESS NETWORKING
Learning Objectives:
At the end of this module, you should be able to:
2. Know what is wireless networking
3. Know what are the needed devices to setup wireless network
What is Wireless Networking?
With the help of wireless technology, we can transfer data from one device to another
without using wire or cables. Using this technology, we can establish network which
is more flexible, intangible, and ease to access.
RF signal is used to setup the connection
sed
as the station name(like 93.5 RED FM)
LESSON
9Week 14-15
63
Requirements to create Wireless Network
ween
devices.
Types of Wireless Network
Wireless LAN
only a limited area.
is being set up for temporary
purposes.
is called Access Point.
devices.
64
WI-FI
-Fi products are certified and tested by Wi-Fi alliance. We can see their
trademarks in most of the Wi-Fi devices.
WWAN (WIRELESS WIDE AREA NETWORK)
many cites together. Mobile Phones use WWAN to make communication possible
The communication system which was used before the emergence of 2G is called
1G used in 1980
2G
ta rates for GSM Evolution)
65
3G
3G
examples of 4th generation technologies are:
66
WPAN
istance are know as WPAN.
example of WPAN
BLUETOOTH
67
SECURITY OPTIONS in Wireless Network
ity. The
RF signal can be intercepted by Antenna.
1. Wired Equivalent Privacy(WEP)
2. Wi-Fi Protected Access(WPA)
3. Wi-Fi Protected Access(WPA2)
WEP
understood only by the Sender and Receiver.
WPA2
-Fi Alliance
equired Firmware up gradation instead of changing any hardware component.
68
ACTIVITY 9
Answer the following questions.
1. What is wireless networking?
2. Why we use wireless networking?
Answer here in the box

More Related Content

What's hot

Computer network basic concepts
Computer network   basic conceptsComputer network   basic concepts
Computer network basic conceptsrahul kapoliya
 
454548 634160871407732500
454548 634160871407732500454548 634160871407732500
454548 634160871407732500prabh_in
 
Lan, man and wan ppt final
Lan, man and wan ppt finalLan, man and wan ppt final
Lan, man and wan ppt finalArushi Garg
 
introduction-to-computer-networking
introduction-to-computer-networkingintroduction-to-computer-networking
introduction-to-computer-networkingSithu PM
 
Networking presentation
Networking presentationNetworking presentation
Networking presentationGajan Hai
 
intro to computer network
intro to computer network intro to computer network
intro to computer network wondimagegndesta
 
Class viii ch-1 networking concepts
Class  viii ch-1 networking conceptsClass  viii ch-1 networking concepts
Class viii ch-1 networking conceptsjessandy
 
network hardware
network hardwarenetwork hardware
network hardwaretumetr1
 
Computer networks--network
Computer networks--networkComputer networks--network
Computer networks--networkDuy Hoang Nguyen
 
Introduction to Computer Networks
 Introduction to Computer Networks Introduction to Computer Networks
Introduction to Computer NetworksGhaffar Khan
 
computer networks presentation
computer networks presentationcomputer networks presentation
computer networks presentationKrishi Agrawal
 

What's hot (19)

Computer network basic concepts
Computer network   basic conceptsComputer network   basic concepts
Computer network basic concepts
 
Networking
NetworkingNetworking
Networking
 
454548 634160871407732500
454548 634160871407732500454548 634160871407732500
454548 634160871407732500
 
OSI model (Tamil)
OSI model (Tamil)OSI model (Tamil)
OSI model (Tamil)
 
Lan, man and wan ppt final
Lan, man and wan ppt finalLan, man and wan ppt final
Lan, man and wan ppt final
 
Networking Technologies : Introduction to data flow
Networking Technologies : Introduction to data flowNetworking Technologies : Introduction to data flow
Networking Technologies : Introduction to data flow
 
COMPUTER NETWORKING
COMPUTER NETWORKINGCOMPUTER NETWORKING
COMPUTER NETWORKING
 
introduction-to-computer-networking
introduction-to-computer-networkingintroduction-to-computer-networking
introduction-to-computer-networking
 
Networking presentation
Networking presentationNetworking presentation
Networking presentation
 
intro to computer network
intro to computer network intro to computer network
intro to computer network
 
Computer networking
Computer networkingComputer networking
Computer networking
 
Class viii ch-1 networking concepts
Class  viii ch-1 networking conceptsClass  viii ch-1 networking concepts
Class viii ch-1 networking concepts
 
network hardware
network hardwarenetwork hardware
network hardware
 
Computer network answer
Computer network answerComputer network answer
Computer network answer
 
Computer networks--network
Computer networks--networkComputer networks--network
Computer networks--network
 
Computer Networking
Computer NetworkingComputer Networking
Computer Networking
 
Computer networks
Computer networksComputer networks
Computer networks
 
Introduction to Computer Networks
 Introduction to Computer Networks Introduction to Computer Networks
Introduction to Computer Networks
 
computer networks presentation
computer networks presentationcomputer networks presentation
computer networks presentation
 

Similar to Computer networking module summary

Class Note
Class NoteClass Note
Class NoteAK IJ
 
1-introduction-to-computer-networking.ppt
1-introduction-to-computer-networking.ppt1-introduction-to-computer-networking.ppt
1-introduction-to-computer-networking.pptjeronimored
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networkingAnuja Lad
 
Understanding Networking Devices – A Brief Introduction | TechLinu.com
Understanding Networking Devices – A Brief Introduction | TechLinu.comUnderstanding Networking Devices – A Brief Introduction | TechLinu.com
Understanding Networking Devices – A Brief Introduction | TechLinu.comTechLinu.com
 
1 introduction-to-computer-networking slide
1 introduction-to-computer-networking slide1 introduction-to-computer-networking slide
1 introduction-to-computer-networking slidenextgencyber cafe
 
ENTERPRISE NETWORKING
ENTERPRISE NETWORKINGENTERPRISE NETWORKING
ENTERPRISE NETWORKINGbwire sedrick
 
Network ppt
Network pptNetwork ppt
Network ppthlalu861
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networkingBesar Limani
 
Grade 11 CSS Lesson 3 Computer Network.pptx
Grade 11 CSS Lesson 3 Computer Network.pptxGrade 11 CSS Lesson 3 Computer Network.pptx
Grade 11 CSS Lesson 3 Computer Network.pptxCatherineBotardo3
 
Computer Network By Pawan Thakur HOD CS & IT VIM BHOPAL
Computer Network By Pawan Thakur HOD CS & IT VIM BHOPALComputer Network By Pawan Thakur HOD CS & IT VIM BHOPAL
Computer Network By Pawan Thakur HOD CS & IT VIM BHOPALGovt. P.G. College Dharamshala
 
Hcs Topic 4 Networks V2
Hcs Topic 4 Networks V2Hcs Topic 4 Networks V2
Hcs Topic 4 Networks V2Kyle
 
Hcs Topic 4 Networks V2
Hcs Topic 4 Networks V2Hcs Topic 4 Networks V2
Hcs Topic 4 Networks V2Naruin
 
Hcs Topic 4 Networks V2
Hcs Topic 4 Networks V2Hcs Topic 4 Networks V2
Hcs Topic 4 Networks V2ekul
 
6.Computer Networks (1).pptx
6.Computer Networks (1).pptx6.Computer Networks (1).pptx
6.Computer Networks (1).pptxKamran Waghani
 
Computer network
Computer networkComputer network
Computer networkAnupan Jain
 
fundamental of information technology(1)
fundamental of information technology(1)fundamental of information technology(1)
fundamental of information technology(1)Sorath Peetamber
 

Similar to Computer networking module summary (20)

Class Note
Class NoteClass Note
Class Note
 
1-introduction-to-computer-networking.ppt
1-introduction-to-computer-networking.ppt1-introduction-to-computer-networking.ppt
1-introduction-to-computer-networking.ppt
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networking
 
Understanding Networking Devices – A Brief Introduction | TechLinu.com
Understanding Networking Devices – A Brief Introduction | TechLinu.comUnderstanding Networking Devices – A Brief Introduction | TechLinu.com
Understanding Networking Devices – A Brief Introduction | TechLinu.com
 
1 introduction-to-computer-networking slide
1 introduction-to-computer-networking slide1 introduction-to-computer-networking slide
1 introduction-to-computer-networking slide
 
ENTERPRISE NETWORKING
ENTERPRISE NETWORKINGENTERPRISE NETWORKING
ENTERPRISE NETWORKING
 
Network ppt
Network pptNetwork ppt
Network ppt
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networking
 
NETWORKING
NETWORKINGNETWORKING
NETWORKING
 
Tata Chuna
Tata Chuna Tata Chuna
Tata Chuna
 
01 - Topology.ppt
01 - Topology.ppt01 - Topology.ppt
01 - Topology.ppt
 
Grade 11 CSS Lesson 3 Computer Network.pptx
Grade 11 CSS Lesson 3 Computer Network.pptxGrade 11 CSS Lesson 3 Computer Network.pptx
Grade 11 CSS Lesson 3 Computer Network.pptx
 
Computer Network By Pawan Thakur HOD CS & IT VIM BHOPAL
Computer Network By Pawan Thakur HOD CS & IT VIM BHOPALComputer Network By Pawan Thakur HOD CS & IT VIM BHOPAL
Computer Network By Pawan Thakur HOD CS & IT VIM BHOPAL
 
Networking basics
Networking basicsNetworking basics
Networking basics
 
Hcs Topic 4 Networks V2
Hcs Topic 4 Networks V2Hcs Topic 4 Networks V2
Hcs Topic 4 Networks V2
 
Hcs Topic 4 Networks V2
Hcs Topic 4 Networks V2Hcs Topic 4 Networks V2
Hcs Topic 4 Networks V2
 
Hcs Topic 4 Networks V2
Hcs Topic 4 Networks V2Hcs Topic 4 Networks V2
Hcs Topic 4 Networks V2
 
6.Computer Networks (1).pptx
6.Computer Networks (1).pptx6.Computer Networks (1).pptx
6.Computer Networks (1).pptx
 
Computer network
Computer networkComputer network
Computer network
 
fundamental of information technology(1)
fundamental of information technology(1)fundamental of information technology(1)
fundamental of information technology(1)
 

Recently uploaded

Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayMakMakNepo
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationAadityaSharma884161
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 

Recently uploaded (20)

Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up Friday
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint Presentation
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 

Computer networking module summary

  • 1. 1 SIBUGAY TECHNICAL INSTITUTE Lower Taway, Ipil, Zamboanga Sibugay Tel-Fax #: (062) 333-2469 www.sibugaytech.com College of Computer Studies MODULE ON COMPUTER NETWORKING 2 Prepared by: Kean Rafael N. Mariano Kean Rafael N. Mariano / 09351190287
  • 2. 2 Introduction to computer Networking Learning Objective: At the end of this module, you should be able to: The definitions of networking Network peripherals, hardware and software Network Definition A network can be defined as two or more computers connected together in such a way that they can share resources. The purpose of a network is to share resources. A resource may be: or just about anything else that exists on a computer. WHAT IS NETWORKING? A network is simply a collection of computers or other hardware devices that are connected together, either physically or logically, using special hardware and software, to allow them to exchange information and cooperate. Networking is the term that describes the processes involved in designing, implementing, upgrading, managing and otherwise working with networks and network technologies. LESSON 1 Week 1-2
  • 3. 3 Advantages of networking The Disadvantages (Costs) of Networking Fundamental Network Classifications Local Area Networks (LANs): A local area network (LAN) is a computer network covering a small geographic area, like a home, office, or group of buildings Wide Area Networks (WANs): a (i.e., any network whose communications links cross metropolitan, regional, or national boundaries). Or, less formally, a network that uses routers and public communications links The largest and most well-known example of a WAN is the Internet. s are used to connect LANs and other types of networks together, so that users and computers in one location can communicate with users and computers in other locations Metropolitan Area Network (MAN): o A metropolitan area network (MAN) is a network that interconnects users with computer resources in a geographic area or region larger than that covered by even a large local area network (LAN) but smaller than the area
  • 4. 4 covered by a wide area network (WAN). The term is applied to the interconnection of networks in a city into a single larger network (which may then also offer efficient connection to a wide area network). It is also used to mean the interconnection of several local area networks by bridging them with backbone lines. The latter usage is also sometimes referred to as a campus network.
  • 5. 5 An intranet is a private network that is contained within an enterprise. It may consist of many interlinked local area networks and also use leased lines in the wide area network. An intranet uses TCP/IP, HTTP, and other Internet protocols and in general looks like a private version of the Internet. With tunneling, companies can send private messages through the public network, using the public network with special encryption/decryption and other security safeguards to connect one part of their intranet to another. - a network of networks in which users at any one computer can, if they have permission, get information from any other computer (and sometimes talk directly to users at other computers). resources necessary to perform any task. task. resource on a client computer. request and receive information over the network client. Client computers also depends primarily on the central server for processing activities
  • 6. 6 -to-peer network is a network where the computers act as both workstations and servers. at for small, simple, and inexpensive networks. -to-peer networking setup, every computer is an equal, a peer in the network. particular device, and each of the devices usually runs similar software. Any device can and will send requests to any other. the task of providing services to a larger number of user machines called clients
  • 7. 7 or logical. tar (physical only) Bus every workstation of distance.
  • 8. 8 messages pass through the trunk, and each workstation checks to see if the message is addressed to itself. If the address of the message matches the workstation’s address, the network adapter copies the message to the card’s on- board memory. it is difficult to add a workstation have to completely reroute the cable and possibly run two additional lengths of it. expensive to maintain. Star Topology hub, making it very easy to add a new workstation. you might expect, if the central device goes down, the entire network goes down.)
  • 9. 9 an example of the organization of the star network. ion to the hub. The hub is placed in a central location in the office. several more cables that need to be installed, plus the cost of the hubs that are needed. Ring unidirectional path where messages move workstation to workstation. to its neighbor on a different network cable. entity is removed from the ring. anymore, mainly because the hardware involved was fairly expensive and the fault tolerance was very low.
  • 10. 10 Mesh the most complex in terms of physical design. cabling. –1)) ÷ 2 cables in the network. For example, if you have five computers in a mesh network, it will use 5 × (5 – 1) ÷ 2, which equals 10 cables. This complexity is compounded when you add another workstation. -computer, 10-cable network will jump to 15 cables just by adding one more computer. Imagine how the person doing the cabling would feel if you told them you had to cable 50 computers in a mesh network—they’d have to come up with 50 × (50 – 1) ÷ 2 = 1225 cables! very expensive to install and maintain. from it is its high fault tolerance.
  • 11. 11 data from source to destination. route. It is for this reason that the mesh topology is still found in WANs to connect multiple sites across WAN links. It uses devices called routers to search multiple routes through the mesh and determine the best path. Topology Advantages Disadvantages Bus Cheap. Easy to install. Difficult to reconfigure. Break in bus disables entire network. Star Cheap. Easy to install. More expensive than bus. Easy to reconfigure. Fault tolerant. Ring Efficient. Easy to install. Reconfiguration difficult. Very expensive. Mesh Simplest. Most fault tolerant. Reconfiguration extremely difficult. Extremely expensive. Very complex.
  • 12. 12 Network Interface Card (NIC) translate data into bytes for the CPU to understand. 1. - Preparing data 2. - Sending and controlling data 3. - Configuration 4. - Drivers 5. - Compatibility 6. - Performance -lane interstate highway. But on a network cable, data travels in a single stream, as on a one lane highway. This difference can cause problems transmitting and receiving data, because the paths traveled are not the same. easily along the cable. fiber-optic NICs, to optical signals).
  • 13. 13 These include the following: - The maximum size of the data frames - The amount of data sent before giving confirmation - The time needed between transmissions - The amount of time needed to wait before sending confirmation - The amount of data a card can hold - The speed at which data transmits network cards are of the same type and they are connected to the same piece of cable. IRQ address, Base I/O port address, and base memory address. Some may also use DMA channels to offer better performance. hardware addresses, neither one of them will be able to communicate. proper device drivers. operate in the Media Access Control sublayer of the Data Link layer of the OSI model. than one type of bus in your PC (for example, a combination ISA/PCI), use an NIC that fits into the fastest type (the PCI, in this case). specially important in servers, as the NIC can very quickly become a bottleneck if this guideline isn’t followed. performance and minimize the amount of time needed to transfer data packets across the network. shared memory adapter, and deciding to allow bus mastering. its maximum allowed length by amplifying the network voltages so they travel farther.
  • 14. 14 segments. For example, we can extend an Ethernet 10Base2 network to 400 meters with a repeater. But can’t connect an Ethernet and Token Ring network together with one. not only include the network signals, but any noise on the wire as well. with the amplified noise. For this reason, repeaters are used only as a temporary fix. process that is also called broadcasting). simply connect all ports together electrically and are usually not powered. to the other ports. ligent” hubs, which are hubs that can be remotely managed on the network.
  • 15. 15 mediocre, because of the design of Ethernet and the number of workstations that are fighting to transmit. If you divide the segment into two segments of 100 workstations each, the traffic will be much lower on either side and performance will increase. he destination address, it is able to forward packets; otherwise a bridge will forward the packets to all segments. They are more intelligent than repeaters but are unable to move data across multiple networks simultaneously. types or perform intelligent path selection. For that function, you would need a router.
  • 16. 16 determine the best path for sending data. path that data can take to get to its destination. such, they analyze every packet, causing packet-forwarding delays. Because of this intelligence, they are also more expensive. etwork segments. -end network switches appear nearly identical to network hubs, but a switch contains more "intelligence" (and a slightly higher price tag) than a network hub. determining the source and destination device of that packet, and forwarding it appropriately.
  • 17. 17 network switch conserves network bandwidth and offers generally better performance than a hub. hub share the bandwidth among themselves, while a device connected to a switch port has the full bandwidth all to itself. -Mbps network, then each node may only get a portion of the 10 Mbps if other nodes on the hub want to communicate as well. . ch, each node could possibly communicate at the full 10 Mbps. Activity 1 Answer the following questions. 1. Draw 2 buildings and connect 5 computers each using 2 different topologies. 2. Define the following terms: a. Switch b. Router c. File d. Host
  • 19. 19 TYPES OF COMPUTER NETWORK Learning Objectives: At the end of this module, you should be able to: 1. Know the difference between Client-server to Peer –to Peer network 2. Know the advantages and disadvantages of peer-to-peer network 3. Know the advantages and disadvantages of client-Server network Classification of Network ▪ The architecture of a network is a logical design that determines how the devices in the network communicate. ▪ The commonly used architectures for computer networks are: 1. Client-server architecture 2. Peer-to-peer architecture 3. Hybrid architecture PEER-TO-PEER ARCHITECTURE ▪ On a network built using the peer-to-peer architecture, there is no specific distinction exists between a client and a server. ▪ Any node can provide a service as well as send a request for a service from another node on the network. ▪ The peer-to-peer network architecture allows sharing of resources, data, and users. ▪ Each node on the network has full control over the network resources. LESSON 2Week 2-3
  • 20. 20 ▪ Peer-to-peer network is also called workgroup ▪ No hierarchy among computers all are equal ▪ No administrator responsible for the network ▪ Advantages of peer-to-peer networks: ▪ Low cost ▪ Simple to configure ▪ User has full accessibility of the computer
  • 21. 21 ▪ Disadvantages of peer-to-peer networks: ▪ May have duplication in resources ▪ Difficult to uphold security policy ▪ Difficult to handle uneven loading ▪ Where peer-to-peer network is appropriate: ▪ 10 or less users ▪ No specialized services required ▪ Security is not an issue ▪ Only limited growth in the foreseeable future ▪ On a network built using the client- server architecture, the devices communicate to other devices through a central computer referred to as a server. ▪ The server is a computer with high processing power, which provides services for the other computers on the network. ▪ The client is a terminal that accesses the resources available on a server.
  • 22. 22 ▪ Clients (Workstation) ▪ Computers that request network resources or services ▪ Network Servers ▪ Computers that manage and provide network resources and services to clients ▪ Usually have more processing power, memory and hard disk space than clients ▪ Run Network Operating System that can manage not only data, but also users, groups, security, and applications on the network ▪ Servers often have a more stringent requirement on its performance and reliability Advantages of client/server networks ▪ Facilitate resource sharing – centrally administrate and control ▪ Facilitate system backup and improve fault tolerance ▪ Enhance security – only administrator can have access to Server ▪ Support more users – difficult to achieve with peer-to-peer networks Disadvantages of client/server networks ▪ High cost for Servers ▪ Need expert to configure the network ▪ Introduce a single point of failure to the system
  • 23. 23 Activity 2 Answer the following questions. 1. What is the difference between Client-server to Peer –to Peer network? 2. What are the advantages and disadvantages of peer-to-peer network? Your Answer here:
  • 24. 24 TYPES OF DATA CABLE Learning Objectives: At the end of this module, you should be able to: 1. Differentiate the types of data cable 2. Know the best cable for the job LESSON 3Week 4-5
  • 25. 25
  • 26. 26
  • 27. 27
  • 28. 28
  • 29. 29 Activity 3 Answer the following questions. 1. Differentiate CAT 6 from CAT6a cable 2. What is the best networking cable with low cost but great in performance? Your Answer here:
  • 30. 30 IP ADDRESS & DOMAIN NAME Learning Objectives: At the end of this module, you should be able to: 1. Define IP 2. Know the purpose of IP Address 3. Know the difference between IPv4 vs. IPv6 4. Know the classes of IP Address Internet Protocol Address  IP address stands for internet protocol address; it is an identifying number that is associated with a specific computer or computer network. When connected to the internet, the IP address allows the computers to send and receive information.  IP address is a numerical label assigned to each device (e.g., computer, printer) participating in a computer network that uses the Internet Protocol for communication. address is same as mobile no. which is unique. network. number. system. LESSON 4Week 7
  • 31. 31 each time, this is known as using a dynamic IP address , or permanently by fixed configuration of its hardware or software is known as using a static IP address. addresses. To help meet the demand for IP addresses, there are two types of addresses used today, IPv4 and IPv6. Although you may only deal with an IPv4 address in your local home, school, or small office you should also be aware of IPv6 addresses for when you encounter them. With an IPv4 IP address, there are five classes of available IP ranges: Class A , Class B, Class C, Class D and Class E , while only A, B, and C are commonly used. Each class allows for a range of valid IP addresses, shown in the following table.
  • 32. 32 Class A IP Address: for networks that had a large number of hosts on the network. The class permitted up to 126 networks by using the first octet of the address for the network identification. 17 million hosts per network. In a Class A address, the network number values start at the number 1 and end at 127. Class B IP Address: medium to large networks. They allow 16,384 networks by using the first two octets in the address for the network identification. hosts per network. Class B network number values start at 128 and finish at 191. Class C IP Address: Class C IP addresses were used in small LAN configurations. They allow for approximately 2 million networks by using the first three octets of the address for the network identification. This allows for 254 hosts per network. A Class C network number value starts at 192 and ends at 223.
  • 33. 33 addresses begin with an octet in the 224- to 239.255.255.255. octet of these addresses ranges between240and 255. to a host device. Domain Name System, or DNS, is the friendly naming system for giving addresses to web servers and web pages. The domain name system gives every server a memorable and easy- to-spell address. Simultaneously, the domain names hide the really technical IP address which most viewers aren't interested in. The top-level domains (TLDs) such as com, net and org are the highest level of domain names of the Internet. Every domain name ends with a top-level domain label.
  • 34. 34 Below the top-level domains in the domain name hierarchy are the second-level domain (SLD) names. These are the names directly to the left of .com, .net , and the other top-level domains. As an example, in the domain flipkart .com is the second-level domain. third-level domains, which are written immediately to the left of a second-level domain. There can be fourth- and fifth-level domains, and so on, with virtually no limitation. An example of an operational domain name with four levels of domain labels is www.flipkart.com WWW.FLIPKART.COM THIRD .SECOND. TOP Domain that falls under this category are named using 2 character country name which are specified by ISO(international standard org.) Example: .in .pk .us .uk Domain that falls under this category are named using 3 character that indicates the functionality of the organization. Example: .com .edu .org .gov
  • 35. 35
  • 36. 36 Activity 4 Answer the following questions. 1. What is IP? 2. What is the main purpose of IP Address? 3. What are the classes of IP and explain each one? Your Answer here:
  • 37. 37 STATIC AND DYNAMIC IP ADDRESS Learning Objectives: At the end of this module, you should be able to: 1. Know the difference between Static IP address to Dynamic IP Address 2. Know when to use Static and Dynamic IP Address. LESSON 5 Week 8
  • 38. 38 ASSIGNING A STATIC IP ADDRESS Here are the procedures in assigning an IP Address on a windows base computer system: • Open the Control Panel’s Network Connections icon. • Open the icon representing your computer’s network connection. • Click the Properties button in the Status dialog box. • From the list of items, choose Internet Protocol (TCP/IP).
  • 39. 39 •CLICK THE PROPERTIES BUTTON. THE INTERNET PROTOCOL (TCP/IP) PROPERTIES DIALOG BOX APPEARS. • Type the IP address for your computer. Enter the appropriate IP Address in the IP address section. • Type a subnet mask. The value used on a local network is commonly 255.255.255.0, but it can be different, such as 255.255.255.127.
  • 40. 40 • Type the default gateway address. The default gateway is the router, so type the router’s address. Figure 54 shows an example of assigning an IP Address, Subnet mask and default gateway. • Type the address for the preferred DNS server. The address should be obtained from your Internet Service Protocol. It is used to help your computer find web pages and other addresses on the internet. • Type the address for the alternate DNS server. The alternate Domain Name System (DNS) server’s IP address is something that your ISP provides. • Click OK to confirm the settings. • Close all other open dialog boxes and windows.
  • 41. 41
  • 42. 42 Activity 5 Answer the following questions. 1. What is the difference between Static IP address to Dynamic IP Address? 2. When to use Static and Dynamic IP Address? Your Answer here:
  • 43. 43 TOOLS & EQUIPMENT IN COMPUTER NETWORKING AND ETHERNET CABLING STANDARDS Learning Objectives: At the end of this module, you should be able to: 3. Enumerate and discuss the tools and equipments use in computer networking 4. Discuss the color scheme of T568A and T568B standardization of network cabling system LESSON 6Week 9-10
  • 44. 44
  • 45. 45
  • 46. 46
  • 47. 47
  • 48. 48
  • 49. 49
  • 50. 50
  • 51. 51 Activity 6 Answer the following questions. 4. When to use straight-trough cabling? 5. When to use cross over cabling? Your Answer here:
  • 52. 52 STRUCTURED CABLING SYSTEM Learning Objectives: At the end of this module, you should be able to: 5. Describe the role of different LAN cable in computer network according to its type. 6. Explain and enumerate the different types of LAN cable and its use. Terminologies • TC – Thin Copper • AL – Aluminum • ANSI – American National Standard Institute • TIA – Telecommunication Industry Association • EIA – Electronic Industry Association • ISO – International Organization for Standardization • Network Topology – Infrastructure of computer network • Ethernet Cable – Cable use to connect your computer to the network. • ACR – Attenuation to Cross-Talk Ration • BER – Bit Error Rate • FEXT – Far End Cross-Talk • NEXT – Near End Cross-Talk • STP – Shielded Twisted Pair • UTP – Unshielded Twisted Pair LESSON 7
  • 53. 53 WHAT IS NETWORK CABLING Cable is the medium through which information usually moves from one network device to another. There are several types of cable which are commonly used with LANs. In some cases, a network will utilize only one type of cable, other networks will use a variety of cable types. The type of cable chosen for a network is related to the network's topology, protocol, and size. Understanding the characteristics of different types of cable and how they relate to other aspects of a network is necessary for the development of a successful network.
  • 54. 54 (1) COAXIAL CABLE The most common type of connector used with coaxial cables is the Bayone-Neill- Concelman (BNC) connector. To help avoid problems with your network, always use the BNC connectors that crimp, rather screw, onto the cable. (2) TWISTED PAIR Twisted pair cabling comes in two varieties: shielded and unshielded. Unshielded twisted pair (UTP) is the most popular and is generally the best option for school networks The quality of UTP may vary from telephone-grade wire to extremely high-speed cable. The cable has four pairs of wires inside the jacket. Each pair is twisted with a different number of twists per inch to help eliminate interference from adjacent pairs and other electrical devices. The tighter the twisting, the higher the supported transmission rate and the greater the cost per foot. (3) FIBER OPTIC CABLE Fiber optic cabling consists of a center glass core surrounded by several layers ofprotectivematerials. It transmits light rather than electronic signals eliminating the problem of electrical interference. This makes it ideal for certain environments that contain a large
  • 55. 55 amount of electrical interference. It has also made it the standard for connecting networks between buildings, due to its immunity tothe effects of moisture and lighting. The number of mobile internet users and the proliferation of connected devices have led to the exponential growth in global internet traffic. These traffic will make more network providers to upgrade their networks and introduce more optical assemblies like fiber optic cables, fiber optic connector, fiber optic transceiver,etc.
  • 56. 56 Activity 6 Answer the following questions. 6. Explain and enumerate the different types of LAN cable and its use 7. Describe the role of different LAN cable in computer network according to its type Your Answer here:
  • 57. 57 NETWORK CABLING Learning Objectives: At the end of this module, you should be able to: 1. Learn proper way on crimping / creating network cables UTP Cabling Steps 1. Strip cable end 2. Untwist wire ends 3. Arrange wires 4. Trim wires to size 5. Attach connector 6. Check 7. Crimp 8. Test LESSON 8Week 13-14
  • 58. 58
  • 59. 59
  • 60. 60
  • 61. 61
  • 62. 62 WIRELESS NETWORKING Learning Objectives: At the end of this module, you should be able to: 2. Know what is wireless networking 3. Know what are the needed devices to setup wireless network What is Wireless Networking? With the help of wireless technology, we can transfer data from one device to another without using wire or cables. Using this technology, we can establish network which is more flexible, intangible, and ease to access. RF signal is used to setup the connection sed as the station name(like 93.5 RED FM) LESSON 9Week 14-15
  • 63. 63 Requirements to create Wireless Network ween devices. Types of Wireless Network Wireless LAN only a limited area. is being set up for temporary purposes. is called Access Point. devices.
  • 64. 64 WI-FI -Fi products are certified and tested by Wi-Fi alliance. We can see their trademarks in most of the Wi-Fi devices. WWAN (WIRELESS WIDE AREA NETWORK) many cites together. Mobile Phones use WWAN to make communication possible The communication system which was used before the emergence of 2G is called 1G used in 1980 2G ta rates for GSM Evolution)
  • 65. 65 3G 3G examples of 4th generation technologies are:
  • 66. 66 WPAN istance are know as WPAN. example of WPAN BLUETOOTH
  • 67. 67 SECURITY OPTIONS in Wireless Network ity. The RF signal can be intercepted by Antenna. 1. Wired Equivalent Privacy(WEP) 2. Wi-Fi Protected Access(WPA) 3. Wi-Fi Protected Access(WPA2) WEP understood only by the Sender and Receiver. WPA2 -Fi Alliance equired Firmware up gradation instead of changing any hardware component.
  • 68. 68 ACTIVITY 9 Answer the following questions. 1. What is wireless networking? 2. Why we use wireless networking? Answer here in the box